eBPF-Guard: a detection method for container escape via multi-level monitoring and enhanced analysis model
Article
| Article Title | eBPF-Guard: a detection method for container escape via multi-level monitoring and enhanced analysis model |
|---|---|
| ERA Journal ID | 17848 |
| Article Category | Article |
| Authors | Li, Xiaotang, Chen, Zhide, Yang, Wencheng, Yang, Xuechao, Luo, Junwei and Yang, Xu |
| Journal Title | Empirical Software Engineering: an international journal |
| Journal Citation | 31 (3) |
| Article Number | 51 |
| Number of Pages | 22 |
| Year | 2026 |
| Publisher | John Wiley & Sons |
| Place of Publication | United States |
| ISSN | 1382-3256 |
| 1573-7616 | |
| Digital Object Identifier (DOI) | https://doi.org/10.1007/s10664-025-10784-1 |
| Web Address (URL) | https://link.springer.com/article/10.1007/s10664-025-10784-1 |
| Abstract | In recent years, cloud-native technologies have rapidly penetrated containerized environments. Their lightweight, flexible, and portable features have made them highly popular among developers. However, the extensive use of containers has also made them a prime target for network attacks, with container vulnerabilities and dangerous mounts frequently leading to container escapes. To address this, this paper proposes a new method that combines eBPF-based multi-level container behavior monitoring with LLM-based anomaly detection. Probes are deployed in the system kernel to conduct multi-level monitoring of container system activities, call features, and behavior logs. The strong semantic understanding and pattern-recognition capabilities of LLMs are utilized to uncover hidden features and abnormal behaviors in the data, enabling precise detection of container issues. Specifically, lightweight eBPF probes are deployed in Linux kernel Namespaces and Cgroups. By parsing node identifiers (Node IDs) in Cgroup hierarchy management and the process isolation features of PID/UID Namespaces, a monitoring chain for cross-host container interactions is constructed. This enables non-intrusive collection of file operations, system calls, and network traffic. During data processing, a dual-window partitioning mechanism and a feature extraction framework based on event type distribution and time-series dependencies are employed. In the behavior analysis layer, we designed a three-layer Chain-of-Thought (CoT) prompt template ("Question-Reasoning-Answer"). Container behavior logs are converted into natural language reasoning chains and embedded into a Q-A-formatted dataset with logical reasoning chains. The Qwen1.5-1.8B-Chat model is fine-tuned using Low-Rank Adaptation (LoRA) technology. Experimental results show that this method performs excellently in container escape anomaly identification scenarios, achieving a detection accuracy of 99.22% in simulated malicious attack scenarios. |
| Keywords | Cloud native ; Container attack; Container ; Large language model ; eBPF |
| Contains Sensitive Content | Does not contain sensitive content |
| ANZSRC Field of Research 2020 | 461299. Software engineering not elsewhere classified |
| Public Notes | Files associated with this item cannot be displayed due to copyright restrictions. |
| Byline Affiliations | Fujian Normal University, China |
| School of Science, Engineering & Digital Technologies- Maths,Physics & Computing | |
| Royal Melbourne Institute of Technology (RMIT) | |
| Minjiang University, China |
https://research.usq.edu.au/item/10138q/ebpf-guard-a-detection-method-for-container-escape-via-multi-level-monitoring-and-enhanced-analysis-model
13
total views0
total downloads13
views this month0
downloads this month